90
Voted
FCCM
15 years 6 months ago
2005 IEEE FCCM
15 years 6 months ago
2005 IEEE
In this paper, we propose a method for speeding-up applications by partitioning them between the reconfigurable hardware blocks of different granularity and mapping critical parts...
90
Voted
FCCM
15 years 6 months ago
2005 IEEE
The solution to a set of sparse linear equations Ax = b, where A is an n×n sparse matrix and b is an n-element vector, can be obtained using the W-matrix method. An enhanced vect...
119
click to vote
FCCM
15 years 6 months ago
2005 IEEE
Just-in-time (JIT) compilation has been used in many applications to enable standard software binaries to execute on different underlying processor architectures. We previously in...
106
Voted
FCCM
15 years 6 months ago
2005 IEEE
The security of the most popular asymmetric cryptographic scheme RSA depends on the hardness of factoring large numbers. The best known method for factorization large integers is ...
|